US8413111B2 - Techniques for dynamic updating and loading of custom application detectors - Google Patents
Techniques for dynamic updating and loading of custom application detectors Download PDFInfo
- Publication number
- US8413111B2 US8413111B2 US12/568,080 US56808009A US8413111B2 US 8413111 B2 US8413111 B2 US 8413111B2 US 56808009 A US56808009 A US 56808009A US 8413111 B2 US8413111 B2 US 8413111B2
- Authority
- US
- United States
- Prior art keywords
- network
- code
- application
- information
- data points
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
- 238000000034 method Methods 0.000 title claims description 57
- 238000001514 detection method Methods 0.000 claims abstract description 135
- 238000004458 analytical method Methods 0.000 claims description 18
- 230000004044 response Effects 0.000 claims description 11
- 238000004806 packaging method and process Methods 0.000 claims description 5
- 238000004891 communication Methods 0.000 description 50
- 238000007689 inspection Methods 0.000 description 46
- 238000012545 processing Methods 0.000 description 14
- 238000012360 testing method Methods 0.000 description 14
- 230000006399 behavior Effects 0.000 description 9
- 230000008569 process Effects 0.000 description 9
- 230000015654 memory Effects 0.000 description 8
- 238000010586 diagram Methods 0.000 description 6
- 230000009471 action Effects 0.000 description 5
- 238000002224 dissection Methods 0.000 description 5
- 238000013459 approach Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000000903 blocking effect Effects 0.000 description 3
- 238000012858 packaging process Methods 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 2
- 230000010365 information processing Effects 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 239000000523 sample Substances 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 241000234282 Allium Species 0.000 description 1
- 235000002732 Allium cepa var. cepa Nutrition 0.000 description 1
- 101001094649 Homo sapiens Popeye domain-containing protein 3 Proteins 0.000 description 1
- 101000608234 Homo sapiens Pyrin domain-containing protein 5 Proteins 0.000 description 1
- 101000578693 Homo sapiens Target of rapamycin complex subunit LST8 Proteins 0.000 description 1
- 102100027802 Target of rapamycin complex subunit LST8 Human genes 0.000 description 1
- 241000700605 Viruses Species 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 238000003491 array Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 238000013499 data model Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 239000012530 fluid Substances 0.000 description 1
- 238000010921 in-depth analysis Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 238000013179 statistical model Methods 0.000 description 1
- 230000005641 tunneling Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/74—Address processing for routing
- H04L45/745—Address table lookup; Address filtering
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/022—Capturing of monitoring data by sampling
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/02—Capturing of monitoring data
- H04L43/026—Capturing of monitoring data using flow identification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
Definitions
- Computer networks can often include hundreds or thousands of network hosts.
- a network host can be a computer or other hardware device that runs software applications and originates and/or receives network traffic.
- Network administrators may often be responsible for maintaining these network hosts in proper running order.
- the network administrators may incorporate a variety of methodologies and devices in an attempt to ensure that any computer network under their supervision operates securely and reliably. To that end, network administrators may often set rules or establish network policies for users, groups, and devices about the types of software applications and network traffic allowed on a network.
- FIG. 1 is a block diagram of a system for detecting and identifying applications that initiate network traffic in one embodiment according to the present invention
- an application detection architecture may incorporate these techniques and well as others that include, two-dimensional hashing, sparsely populated arrays, an integer-oriented approach to string matching, protocol state information maintained in “probes,” wide use of shared memory, and dynamic loaded libraries and “filter updates” for scalability, speed, and to offer quick assessments for rapid detection.
- network packets may be thus examined in real-time or substantially in real-time, for example, at 1 Gbit line rates. Accordingly, an application detection architecture may be employed that utilizes techniques that are computationally fast, yet accurate for their purposes.
- FIG. 1 is a block diagram of system 100 that may incorporate techniques for detecting and identifying applications that initiate network flows in various embodiments according to the present invention.
- system 100 can include a plurality of clients 110 (e.g., client 110 A, client 110 B, and client 110 C), network traffic manager 120 , communications network 130 , firewall 140 , communications network 150 , server 160 , and host 170 .
- network traffic manager 120 may be situated to be in communication with communications network 130 and configured to communicate with hosts coupled to communications networks 130 and 150 in a client-server fashion.
- Network traffic manager 120 may support one or more communications protocols, such as any kind of any kind of open source, commercially available, or reverse engineered proprietary protocols, (e.g., HTTP, HTTPS, FTP, SMTP, POP3, IMAP, IM protocols, SIP, etc.).
- network traffic manager 120 may communicated with client 110 B using a proprietary messaging protocol that is specially defined for use between client 110 B and network traffic manager 120 .
- FIG. 2 is a block diagram of an embodiment of network traffic manager 120 that may be included in system 100 of FIG. 1 in one embodiment according to the present invention.
- Network manager 120 may be embodied as a single computing device or as multiple computing devices implementing different aspects of the disclosed functionality.
- network traffic manager 120 includes transceiver module 205 , network traffic module 210 , policy module 215 , and action module 220 .
- Some examples of the information collected, either directly from network traffic or from other sources can include the source and destination addresses of network packets, the size of network data in network packets, the contents of network packets, the rate of related network packets in a network flow, other attributes of one or more network packets in a network flow, host information, user information, operating system information, or the like.
- a series or sequence of one or more inspection engines are utilized to generate a correlation between a set of multiple data points in the network flow, such as using string matching, USER_AGENT, packet number, flow direction, stream offset, connection type, or the like.
- custom dissectors can be called from the MIP tier or SIP tier for use as a final stage fall through for deep analysis of the network flow.
- the 3rd Tier may be used when packet spanning is required to determine the identity of an application that originated the network flow.
- Hostname to IP Address conversion a component that can convert hostnames to IP addresses. Since the association between hostnames and IP addresses can be fluid and may change, the engine may periodically check with the DNS system to retrieve DNS information, such as a hostnames' current IP addresses.
- HTTP URL Inspection Engine a component that can inspect HTTP URLs to identify managed HTTP-based protocols.
- SIP engine 240 can include hardware and/or software elements configured for identifying a network-based application from network traffic or a network flow using at least one inspection point.
- an inspection point may include at least one data point in network traffic or a network flow, such as an IP address, a URL, a hostname, a domain or domain name, a filename, or the like.
- SIP engine 240 may be embodied as a single engine configured to perform a series or sequence of SIP tests or as a logical series or sequence of SIP test-specific engines.
- SIP engine 240 may generate information used to identify a network-based application from the network traffic or network flow and indicators quantifying confidence that the network-based application has been identified.
- SIP engine 240 may further generate information used to invoke MIP engine 250 or Custom dissector engine 260 for further analysis.
- Policy module 215 may be configure to access a number of policies.
- policy module 215 may include policy database 255 that stores a set of policies. As shown, policy database 255 is located in policy module 215 ; however, it will be understood that policy database 255 may be located anywhere in network traffic manager 120 or be separate from network traffic manager 120 .
- the policies in policy database 255 may include information about actions that can be taken by network traffic monitor 120 .
- the policies may be applied to a packet, group of packets, a network flow, a user, a device, or the like.
- Policy module 215 may determine from user information, group information, machine information, characteristics related to network flows, or the like whether any policies in policy database 255 applies.
- Policy module 215 may communicate with network traffic module 210 to enforce policies for detected applications. Once a policy is determined by policy module 215 , action module 220 may be configured to perform the action corresponding to the determined policy.
- database 260 may be used to store information usable for network traffic monitor 120 .
- Database 260 may be included in network traffic monitor 120 or be separate from network traffic monitor 120 .
- database 260 can includes one or more information items including but not limited to: credential information, user information, user to IP address mappings, client identifications for clients 110 , policies that may be implemented by policy module 215 , or the like. This information is used by modules in network traffic manager 120 for any purpose.
- network traffic manager 120 can detect and identify network-based applications that initiate network flows.
- a layered approach employed by network traffic manager 120 in some embodiments to application detection can provide scalability and speed, while further providing quick assessments that move from simplest to complex for rapid detection and policy enforcement.
- Signature discovery can include one or more manual or automated processes in which information is collection about a network based application or its behavior.
- a team of engineers and/or other network-based application investigators can collect information about network-based applications or their behavior and store the information in a database.
- the information collection about a network based application or its behavior may represent a signature.
- a signature can include one or more portions of information that identify an application from network traffic initiated or otherwise generated by the application, from its behavior, from where it was downloaded or developed, resources used or accessed, or the like.
- an application signature may include a single data element or data point, such as a predetermined value found within a portion packet.
- an application signature may include a plurality of data elements.
- an application signature may include one or more data elements, or data structures having one or more values, that may be determined, interpreted, or calculated using logic or coding from network traffic.
- An application signature may be generated by a manual process or by a completely automated process from information retrieved from a database using a data model.
- signature update packaging is performed.
- a set of one or more application signatures may be “packaged” into a downloadable file or distributable format.
- the packaging process may incorporate one or more application signatures, including any data structures or program logic, as well as other metadata, code, rule sets, registry information, access control lists, policies, security information, or other information updates.
- the packaging process may be cumulative (e.g., including all application signatures resulting from a predetermined discovery process) or may be incremental (e.g., including only those application signatures resulting after a predetermined time or event).
- a signature update is downloaded.
- network traffic manager 120 may connect to server 160 or host 170 to download one or more filter updates.
- a filter update can include information made available according to the above packaging process.
- a signature update may be distributed on physical media and installed or added to network traffic manager 120 using a manual process.
- a main program of network traffic manager 120 when configured as an application detection device, may dynamically and/or automatically install, initialize, update, reinstall, uninstall, or the like, configurations for one or more inspection engines used in application detection. These configurations may include configurations for single inspection point engines, multiple inspection point, and custom inspection point engines.
- one or more network traffic elements or data points are identified.
- a given network-based application may be associated with an application-specific protocol. Therefore, network traffic generated by or otherwise originating from the network-based application may conform to a recognizable format (i.e., the application-specific protocol).
- One or more inspection or data points in network traffic may be established from particular bytes of a packet, predetermined fields within a header, source network addresses/ports, destination network addresses/ports, payload structure, payload contents, transmission control parameters, flow control information, state obtained from a sequence of packets, string matching, checksums, presences/absence of encryption, statistical models, behavioral models, or the like.
- step 440 information associating the one or more identified data points with the application is stored.
- the information may be stored in an application detection database 350 .
- Application detection database 450 may include the data points, metadata associated with each data point, an application description, logic correlating one or more data points, or the like.
- Method 400 depicted in FIG. 4 ends in step 460 .
- one or more rules or rule sets for a single inspection point (SIP) engine or a multiple inspection point (MIP) engine are generated or custom dissector code is generated based on the information.
- a rule may indicated a set of inputs or conditions and a set of outputs for when the inputs or conditions are met, matched, or otherwise satisfied.
- a rule is executed or otherwise applied by a given inspection engine or inspector which includes information specifying which data point the given inspection engine or inspector needs to inspect (e.g., what byte or set of bytes of a packet are to be looked at) and information indicative of a predetermined value or expected result that when matched with the data point causes the rule to be satisfied or otherwise generated an match condition or indication.
- step 630 application/signature ID assignment is performed. ID assignment may be performed using an application/signature archive where IDs for previously packaged signatures for applications may be retrieved and new IDs may be assigned.
- step 640 signature updated formatting is performed.
- step 650 signature header file generation is performed.
- step 660 the packaged signature update is uploaded to a download site, such as a website, FTP site, bittorrent site, or the like. The signature update is then available for download to one or more application detection devices, such as network traffic manager 120 of FIG. 1 . Method 600 depicted in FIG. 6 ends in step 670 .
- FIG. 8 is a flowchart of method 800 for detecting applications from network traffic in one embodiment according to the present invention.
- Method 800 depicted in FIG. 8 begins in step 805 .
- method 800 depicted in FIG. 8 may be performed independently by each of a plurality of inspection engines or detectors.
- an individual detection engine may, in a first tier of analysis, inspect one data point for the purposes of detecting an application. Based on pass/fail results, the detection engine may, in a second tier of analysis, inspect multiple data points for the purposes of detecting applications. Based on pass/fail results, the individual detectors may invoke or employ one or more custom dissectors that, in a third tier of analysis, cover false positive/false negative scenarios or other application-specific protocols.
- FIG. 9 is a simplified block diagram of computer system 900 that may incorporate embodiments of the present invention.
- FIG. 9 is merely illustrative of an embodiment incorporating the present invention and does not limit the scope of the invention as recited in the claims.
- One of ordinary skill in the art would recognize other variations, modifications, and alternatives.
- computer system 900 typically includes a monitor 910 , a computer 920 , user output devices 930 , user input devices 940 , communications interface 950 , and the like.
- computer system 900 may also include software that enables communications over a network such as the HTTP, TCP/IP, RTP/RTSP protocols, and the like.
- software that enables communications over a network
- HTTP HyperText Transfer Protocol
- TCP/IP Transmission Control Protocol
- RTP/RTSP protocols Real-Time Transport Protocol
- other communications software and transfer protocols may also be used, for example IPX, UDP or the like.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Mining & Analysis (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Description
-
- may be displayed or otherwise made accessible to a user, used in a “dashboard,” or appear in the output of reports;
- for which the application detection device can gather “use” statistics;
- can in fact be detected, blocked or in some other manner, managed by the application detection device;
- are associated with any of one or more categories to which a given detectable application belongs; or
- are association with any of one or more descriptions of a given detectable application that may be shown to the user or provided for reporting purposes.
-
- A 1st Tier: Rapid quick-hit packet engine that addresses, for example, up to ˜60% or more of the application space.
- A 2nd Tier: More complex engine that effectively conducts multiple tests that addresses, for example, up to ˜35% or more of the application space.
- A 3rd Tier: Customized engine for in-depth analysis also capable of packet spanning needed for, for example, up to ˜5% or more of the application space.
Claims (24)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/568,080 US8413111B2 (en) | 2008-10-02 | 2009-09-28 | Techniques for dynamic updating and loading of custom application detectors |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10234308P | 2008-10-02 | 2008-10-02 | |
US10316408P | 2008-10-06 | 2008-10-06 | |
US12/568,080 US8413111B2 (en) | 2008-10-02 | 2009-09-28 | Techniques for dynamic updating and loading of custom application detectors |
Publications (2)
Publication Number | Publication Date |
---|---|
US20100088670A1 US20100088670A1 (en) | 2010-04-08 |
US8413111B2 true US8413111B2 (en) | 2013-04-02 |
Family
ID=42076817
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US12/568,080 Active 2031-12-21 US8413111B2 (en) | 2008-10-02 | 2009-09-28 | Techniques for dynamic updating and loading of custom application detectors |
Country Status (1)
Country | Link |
---|---|
US (1) | US8413111B2 (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130007700A1 (en) * | 2011-06-29 | 2013-01-03 | Microsoft Corporation | Code suggestions |
US20130232240A1 (en) * | 2012-03-02 | 2013-09-05 | Payoda Inc. | Centralized dashboard for monitoring and controlling various application specific network components across data centers |
US20140195645A1 (en) * | 2013-01-04 | 2014-07-10 | Netflix, Inc. | Proxy application with dynamic filter updating |
EP3033687A4 (en) * | 2013-08-12 | 2017-07-05 | Hewlett-Packard Enterprise Development LP | Application-aware network management |
US9930025B2 (en) | 2015-03-23 | 2018-03-27 | Duo Security, Inc. | System and method for automatic service discovery and protection |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8434056B2 (en) * | 2009-06-17 | 2013-04-30 | Phillip J. Windley | Rule engine system controlling devices of disparate types and protocols |
FR2949934B1 (en) * | 2009-09-09 | 2011-10-28 | Qosmos | MONITORING A COMMUNICATION SESSION COMPRISING SEVERAL FLOWS ON A DATA NETWORK |
US20110202646A1 (en) * | 2010-02-14 | 2011-08-18 | Bhatia Randeep S | Policy controlled traffic offload via content smart-loading |
US9569326B2 (en) | 2010-04-15 | 2017-02-14 | Ca, Inc. | Rule organization for efficient transaction pattern matching |
KR101714830B1 (en) * | 2010-10-27 | 2017-03-22 | 인터디지탈 패튼 홀딩스, 인크 | Scalable policy-controlled packet inspection systems and methods for advanced application interface |
US20140040279A1 (en) * | 2012-08-02 | 2014-02-06 | International Business Machines Corporation | Automated data exploration |
WO2014020445A2 (en) * | 2012-08-03 | 2014-02-06 | Marvell World Trade Ltd. | Systems and methods for deep packet inspection with a virtual machine |
US10332005B1 (en) * | 2012-09-25 | 2019-06-25 | Narus, Inc. | System and method for extracting signatures from controlled execution of applications and using them on traffic traces |
US8973139B2 (en) * | 2012-11-29 | 2015-03-03 | At&T Intellectual Property I, L.P. | Detecting altered applications using network traffic data |
US9265458B2 (en) | 2012-12-04 | 2016-02-23 | Sync-Think, Inc. | Application of smooth pursuit cognitive testing paradigms to clinical drug development |
US9380976B2 (en) | 2013-03-11 | 2016-07-05 | Sync-Think, Inc. | Optical neuroinformatics |
US9325610B2 (en) * | 2013-03-15 | 2016-04-26 | Cisco Technology, Inc. | Extended tag networking |
US9058504B1 (en) * | 2013-05-21 | 2015-06-16 | Malwarebytes Corporation | Anti-malware digital-signature verification |
US20140351415A1 (en) * | 2013-05-24 | 2014-11-27 | PacketSled Inc. | Selective packet capture |
US10713360B2 (en) * | 2016-02-19 | 2020-07-14 | Secureworks Corp. | System and method for detecting and monitoring network communication |
US10432484B2 (en) * | 2016-06-13 | 2019-10-01 | Silver Peak Systems, Inc. | Aggregating select network traffic statistics |
WO2018035251A1 (en) * | 2016-08-17 | 2018-02-22 | Performance And Privacy Ireland Ltd. | Deriving mobile application usage from network traffic |
CN109359028B (en) * | 2018-08-22 | 2024-05-03 | 平安科技(深圳)有限公司 | Code quality monitoring method, device, computer equipment and storage medium |
US10326676B1 (en) * | 2019-01-08 | 2019-06-18 | Extrahop Networks, Inc. | Automated risk assessment based on machine generated investigation |
US11165823B2 (en) | 2019-12-17 | 2021-11-02 | Extrahop Networks, Inc. | Automated preemptive polymorphic deception |
US20210328934A1 (en) * | 2021-06-25 | 2021-10-21 | Intel Corporation | Systems, apparatus, and methods for edge data prioritization |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5619645A (en) * | 1995-04-07 | 1997-04-08 | Sun Microsystems, Inc. | System isolation and fast-fail |
US6003084A (en) * | 1996-09-13 | 1999-12-14 | Secure Computing Corporation | Secure network proxy for connecting entities |
US20040030778A1 (en) * | 1998-10-13 | 2004-02-12 | Kronenberg Sandy Craig | Method, apparatus, and article of manufacture for a network monitoring system |
US20090006592A1 (en) * | 2007-06-29 | 2009-01-01 | Novell, Inc. | Network evaluation grid techniques |
US20090109845A1 (en) * | 2007-10-24 | 2009-04-30 | Flemming Andreasen | Packet Flow Optimization (PFO) Policy Management in a Communications Network by Rule Name |
US20100083382A1 (en) * | 2001-04-27 | 2010-04-01 | Farley Timothy P | Method and System for Managing Computer Security Information |
US7707401B2 (en) * | 2002-06-10 | 2010-04-27 | Quest Software, Inc. | Systems and methods for a protocol gateway |
US20100154059A1 (en) * | 2008-12-11 | 2010-06-17 | Kindsight | Network based malware detection and reporting |
US20100162348A1 (en) * | 2008-12-24 | 2010-06-24 | Qualcomm Incorporated | Method and apparatus for providing network communication association information to applications and services |
US7809818B2 (en) * | 2007-03-12 | 2010-10-05 | Citrix Systems, Inc. | Systems and method of using HTTP head command for prefetching |
US7933221B1 (en) * | 2008-08-21 | 2011-04-26 | Sprint Communications Company L.P. | Regulating dataflow between a mobile device and a wireless telecommunications network |
US20110213869A1 (en) * | 2000-09-25 | 2011-09-01 | Yevgeny Korsunsky | Processing data flows with a data flow processor |
-
2009
- 2009-09-28 US US12/568,080 patent/US8413111B2/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5619645A (en) * | 1995-04-07 | 1997-04-08 | Sun Microsystems, Inc. | System isolation and fast-fail |
US6003084A (en) * | 1996-09-13 | 1999-12-14 | Secure Computing Corporation | Secure network proxy for connecting entities |
US20040030778A1 (en) * | 1998-10-13 | 2004-02-12 | Kronenberg Sandy Craig | Method, apparatus, and article of manufacture for a network monitoring system |
US20090106421A1 (en) * | 1998-10-13 | 2009-04-23 | Netarx, Inc. | Network Monitoring System |
US20110213869A1 (en) * | 2000-09-25 | 2011-09-01 | Yevgeny Korsunsky | Processing data flows with a data flow processor |
US20100083382A1 (en) * | 2001-04-27 | 2010-04-01 | Farley Timothy P | Method and System for Managing Computer Security Information |
US7707401B2 (en) * | 2002-06-10 | 2010-04-27 | Quest Software, Inc. | Systems and methods for a protocol gateway |
US7809818B2 (en) * | 2007-03-12 | 2010-10-05 | Citrix Systems, Inc. | Systems and method of using HTTP head command for prefetching |
US20090006592A1 (en) * | 2007-06-29 | 2009-01-01 | Novell, Inc. | Network evaluation grid techniques |
US20090109845A1 (en) * | 2007-10-24 | 2009-04-30 | Flemming Andreasen | Packet Flow Optimization (PFO) Policy Management in a Communications Network by Rule Name |
US7933221B1 (en) * | 2008-08-21 | 2011-04-26 | Sprint Communications Company L.P. | Regulating dataflow between a mobile device and a wireless telecommunications network |
US20100154059A1 (en) * | 2008-12-11 | 2010-06-17 | Kindsight | Network based malware detection and reporting |
US20100162348A1 (en) * | 2008-12-24 | 2010-06-24 | Qualcomm Incorporated | Method and apparatus for providing network communication association information to applications and services |
Non-Patent Citations (2)
Title |
---|
Title: Comparative association rules mining using Genetic Network Programming(GNP) with attributes accumulation mechanism and its application to traffic systems , author: Wei Wei et al, source: IEEE, dated: Jun. 1, 2008. * |
Title: Learning rules for anomaly detection of hostile network traffic , Mahoney, M.V et al, source: IEEE, dated: 2003. * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9383973B2 (en) * | 2011-06-29 | 2016-07-05 | Microsoft Technology Licensing, Llc | Code suggestions |
US20130007700A1 (en) * | 2011-06-29 | 2013-01-03 | Microsoft Corporation | Code suggestions |
US20130232240A1 (en) * | 2012-03-02 | 2013-09-05 | Payoda Inc. | Centralized dashboard for monitoring and controlling various application specific network components across data centers |
US9590876B2 (en) * | 2012-03-02 | 2017-03-07 | Payoda Inc. | Centralized dashboard for monitoring and controlling various application specific network components across data centers |
US8954495B2 (en) * | 2013-01-04 | 2015-02-10 | Netfilx, Inc. | Proxy application with dynamic filter updating |
US9294415B2 (en) | 2013-01-04 | 2016-03-22 | Netflix, Inc. | Proxy application with dynamic filter updating |
US20140195645A1 (en) * | 2013-01-04 | 2014-07-10 | Netflix, Inc. | Proxy application with dynamic filter updating |
US9686371B2 (en) | 2013-01-04 | 2017-06-20 | Netflix, Inc. | Proxy application with dynamic filter updating |
US10212246B2 (en) | 2013-01-04 | 2019-02-19 | Netflix, Inc. | Proxy application with dynamic filter updating |
EP3033687A4 (en) * | 2013-08-12 | 2017-07-05 | Hewlett-Packard Enterprise Development LP | Application-aware network management |
US9954743B2 (en) | 2013-08-12 | 2018-04-24 | Hewlett Packard Enterprise Development Lp | Application-aware network management |
US9930025B2 (en) | 2015-03-23 | 2018-03-27 | Duo Security, Inc. | System and method for automatic service discovery and protection |
US10594677B2 (en) | 2015-03-23 | 2020-03-17 | Duo Security, Inc. | System and method for automatic service discovery and protection |
Also Published As
Publication number | Publication date |
---|---|
US20100088670A1 (en) | 2010-04-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8413111B2 (en) | Techniques for dynamic updating and loading of custom application detectors | |
US8484338B2 (en) | Application detection architecture and techniques | |
US11330000B2 (en) | Malware detector | |
US20230388349A1 (en) | Policy enforcement using host information profile | |
US11394728B2 (en) | Associating a user identifier detected from web traffic with a client address | |
Deri et al. | ndpi: Open-source high-speed deep packet inspection | |
US8966625B1 (en) | Identification of malware sites using unknown URL sites and newly registered DNS addresses | |
US7809829B2 (en) | Categorizing, classifying, and identifying network flows using network and host components | |
US7702772B2 (en) | Discovering and determining characteristics of network proxies | |
US20110252327A1 (en) | Methods, systems, and user interfaces for graphical summaries of network activities | |
US10735422B2 (en) | Automated individualized network security controls for internet of things (IoT) devices | |
WO2020086714A1 (en) | Network security system with enhanced traffic analysis based on feedback loop | |
US10432659B2 (en) | Implementation comparison-based security system | |
US11411851B2 (en) | Network sensor deployment for deep packet inspection | |
US8122129B2 (en) | Hash-based resource matching | |
US20210021611A1 (en) | Inline malware detection | |
CN112073437A (en) | Multidimensional security threat event analysis method, device, equipment and storage medium | |
WO2017217247A1 (en) | Malignant event detection apparatus, malignant event detection method, and malignant event detection program | |
Perelman et al. | Flow signatures of popular applications | |
Spiekermann et al. | Using network data to improve digital investigation in cloud computing environments | |
O'Leary et al. | Snort | |
Siddiqui et al. | SUTMS: Designing a Unified Threat Management System for Home Networks | |
JP2016031687A (en) | Malware communication control device | |
Nunnery | Advances in modern botnet understanding and the accurate enumeration of infected hosts |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FACETIME COMMUNICATIONS, INC.,CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE RE-RECORDING TO REMOVE THE INCORRECT DOCKET NUMBER, SERIAL NUMBER AND TITLE PREVIOUSLY RECORDED ON REEL 023475 FRAME 0668. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT FROM STEVEN B. PASTER TO FACETIME COMMUNICATIONS, INC.;ASSIGNOR:PASTER, STEVEN B.;REEL/FRAME:023522/0442 Effective date: 20090929 Owner name: FACETIME COMMUNICATIONS, INC., CALIFORNIA Free format text: CORRECTIVE ASSIGNMENT TO CORRECT THE RE-RECORDING TO REMOVE THE INCORRECT DOCKET NUMBER, SERIAL NUMBER AND TITLE PREVIOUSLY RECORDED ON REEL 023475 FRAME 0668. ASSIGNOR(S) HEREBY CONFIRMS THE ASSIGNMENT FROM STEVEN B. PASTER TO FACETIME COMMUNICATIONS, INC.;ASSIGNOR:PASTER, STEVEN B.;REEL/FRAME:023522/0442 Effective date: 20090929 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: GOLUB CAPITAL LLC, AS AGENT, ILLINOIS Free format text: SECURITY INTEREST;ASSIGNOR:ACTIANCE, INC.;REEL/FRAME:035527/0923 Effective date: 20150429 |
|
AS | Assignment |
Owner name: ACTIANCE, INC., CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:FACETIME COMMUNICATIONS, INC.;REEL/FRAME:035705/0823 Effective date: 20110125 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
FEPP | Fee payment procedure |
Free format text: PAT HOLDER CLAIMS SMALL ENTITY STATUS, ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: LTOS); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
AS | Assignment |
Owner name: PNC BANK, NATIONAL ASSOCIATION, PENNSYLVANIA Free format text: SECURITY INTEREST;ASSIGNORS:MOBILEGUARD, LLC;SMARSH INC.;SKYWALKER INTERMEDIATE HOLDINGS, INC.;AND OTHERS;REEL/FRAME:045065/0916 Effective date: 20180227 |
|
FEPP | Fee payment procedure |
Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 8 |
|
AS | Assignment |
Owner name: ACTIANCE, INC., CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST REEL/FRAME: 035527 / 0923;ASSIGNOR:GOLUB CAPITAL LLC;REEL/FRAME:058906/0160 Effective date: 20171130 |
|
AS | Assignment |
Owner name: OWL ROCK CAPITAL CORPORATION, AS COLLATERAL AGENT, NEW YORK Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:ACTIANCE, INC.;REEL/FRAME:059191/0423 Effective date: 20220218 |
|
AS | Assignment |
Owner name: ACTIANCE HOLDINGS, INC., OREGON Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT REEL/FRAME NO. 45065/0916;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:059315/0572 Effective date: 20220218 Owner name: ACTIANCE, INC., CALIFORNIA Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT REEL/FRAME NO. 45065/0916;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:059315/0572 Effective date: 20220218 Owner name: SKYWALKER INTERMEDIATE HOLDINGS, INC., OREGON Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT REEL/FRAME NO. 45065/0916;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:059315/0572 Effective date: 20220218 Owner name: SMARSH INC., OREGON Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT REEL/FRAME NO. 45065/0916;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:059315/0572 Effective date: 20220218 Owner name: MOBILEGUARD, LLC, OREGON Free format text: TERMINATION AND RELEASE OF PATENT SECURITY AGREEMENT AT REEL/FRAME NO. 45065/0916;ASSIGNOR:PNC BANK, NATIONAL ASSOCIATION;REEL/FRAME:059315/0572 Effective date: 20220218 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 12TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1553); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 12 |